OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

egov-ms message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: Re: [egov-ms] OASIS eGOV MS : NEW GUIDANCE DOCUMENTS


http://www.whitehouse.gov/omb/e-gov/

• Privacy Act of 1974 (Public Law 93-579), December 1974
• Federal Managers Financial Integrity Act (FMFIA), September 1982
• Computer Security Act of 1987, January 1988
• Paperwork Reduction Act (Public Law 104-13), May 1995
• Information Technology Management Reform Act of 1996 (Clinger-Cohen 
Act) (Public Law 104-106), February 1996
• USA PATRIOT Act (Public Law 107-56), October 2001
• E-Government Act of 2002 (Public Law 107-347), December 2002
• Federal Information Security Management Act of 2002 [FISMA] (Public 
Law 107-347, Title III), December 2002
• Code of Federal Regulations, Title 5, Administrative Personnel, Part 
731, Suitability, Subpart A, Scope, Section106, Designation of Public 
Trust Positions and Investigative Requirements, (5 C.F.R.731.106)
• Code of Federal Regulations, Title 5, Administrative Personnel, Part 
930, Programs for Specific Positions and Examinations, Subpart C, 
Sections 930.301 through 930.305, Employees Responsible for the 
Management or Use of Federal Computer Systems, (5 C.F.R. 930.301-305)
• Presidential Decision Directive 63 (PDD-63), Critical Information 
Protection, May 1998
• Homeland Security Presidential Directive (HSPD) 12, Policy for a 
Common Identification Standard for Federal Employees and Contractors, 
August 27, 2004
• Homeland Security Presidential Directive (HSPD-7), Critical 
Infrastructure Identification, Prioritization, and Protection
• Department of Defense Instruction 8500.2, Information Assurance 
Implementation, February 2003
• Department of Defense, Chief Information Officer Memorandum, 
Encryption of Sensitive Unclassified Data at rest on Mobile Computing 
Devices and Removable Storage Media, July 03, 2007
• Director of Central Intelligence Directive 6/3 Manual, Protecting 
Sensitive Compartmented Information within Information Systems, June 1999
• Director of Central Intelligence Directive 6/3 Manual, Protecting 
Sensitive Compartmented Information within Information Systems, May 2000
• Office of Management and Budget (OMB) Circular A-130, Appendix III, 
Transmittal Memorandum #4, Management of Federal Information Resources, 
November 2000
• Office of Management and Budget, Circular A-130, Management of Federal 
Information Resources, Appendix III, Security of Federal Automated 
Information Systems, as revised November 2000
• Office of Management and Budget Memorandum M-02-01, Guidance for 
Preparing and Submitting Security Plans of Action and Milestones, 
October 2001
• Office of Management and Budget Memorandum M-03-19, Reporting 
Instructions for the Federal Information Security Management Act and 
Updated Guidance on Quarterly IT Security Reporting, August 2003
• Office of Management and Budget, Federal Enterprise Architecture 
Program Management Office, Business Reference Model (v2.0), June 2003
• Office of Management and Budget Memorandum M-03-22, OMB Guidance for 
Implementing the Privacy Provisions of the E-Government Act of 2002, 
September 26, 2003
• Office of Management and Budget Memorandum M-04-04, E-Authentication 
for Federal Agencies, December 2003
• Office of Management and Budget Memorandum M-05-24, Implementation of 
Homeland Security Presidential Directive (HSPD)12 – Policy for a Common 
Identification Standard for Federal Employees and Contractors, August 2005
• Office of Management and Budget Memorandum M-06-16, Protection of 
Sensitive Information, June 2006
• Office of Management and Budget Memorandum M-06-20, FY 2006 Reporting 
Instructions for the Federal Information Security Management Act and 
Agency Privacy Management, July 2006
• National Institute of Standards and Technology Federal Information 
Processing Standards (FIPS) Publication 140-2, Security Requirements for 
Cryptographic Modules, May 25, 2001
• National Institute of Standards and Technology Federal Information 
Processing Standards (FIPS) Publication 180-2, Secure Hash Standard 
(SHS), August 2002
• National Institute of Standards and Technology Federal Information 
Processing Standards (FIPS) Publication 186-2, Digital Signature 
Standard (DSS), January 2000
• National Institute of Standards and Technology Federal Information 
Processing Standards (FIPS) Publication 188, Standard Security Labels 
for Information Transfer, September 1994
• National Institute of Standards and Technology Federal Information 
Processing Standards (FIPS) Publication 190, Guidelines for the Use of 
Advanced Authentication Technology Alternatives, September 1994
• National Institute of Standards and Technology Federal Information 
Processing Standards (FIPS) Publication 197, Advanced Encryption 
Standards (AES), November 2001
• National Institute of Standards and Technology Federal Information 
Processing Standards (FIPS) Publication 198, The Keyed-Hash Message 
Authentication Code (HMAC), March 2002
• National Institute of Standards and Technology Federal Information 
Processing Standards (FIPS) Publication 199, Standards for Security 
Categorization of Federal Information and Information Systems, February 
2004
• National Institute of Standards and Technology Federal Information 
Processing Standards (FIPS) Publication 200, Minimum Security 
Requirements for Federal Information and Information Systems, March 2006
• National Institute of Standards and Technology Federal Information 
Processing Standards (FIPS) Publication 201-1, Personal Identity 
Verification (PIV) of Federal Employees and Contractors, March 2006
• International Organization for Standardization/International 
Electrotechnical Commission 17799, Code of Practice for Information 
Security Management, June 2005
• International Organization for Standardization/International 
Electrotechnical Commission 27001, Information Security Management 
System Requirements, October 2005
• National Security Telecommunications and Information Systems Security 
(NSTISSI) 7003, Protective Distribution Systems (PDS), December 13, 1996
• NIST Special Publication 800-12, An Introduction to Computer Security: 
The NIST Handbook, October 1995
• NIST Special Publication 800-13, Telecommunications Security 
Guidelines for Telecommunications Management Network, October 1995
• NIST Special Publication 800-14, Generally Accepted Principles and 
Practices for Securing Information Technology Systems, September 1996
• National Institute of Standards and Technology Special Publication 
800-15, Minimum Interoperability Specifications for PKI Components 
(MISPC), Version 1, September 1997
• National Institute of Standards and Technology Special Publication 
800-16, Information Technology Security Training Requirements: A Role- 
and Performance-Based Model, April 1998
• National Institute of Standards and Technology Special Publication 
800-17, Modes of Operation Validation System (MOVS): Requirements and 
Procedures, February 1998
• National Institute of Standards and Technology Special Publication 
800-18, Revision 1, Guide for Developing Security Plans for Federal 
Information Systems, February 2006
• National Institute of Standards and Technology Special Publication 
800-19, Mobile Agent Security, October 1999
• National Institute of Standards and Technology Special Publication 
800-20, Modes of Operation Validation System for the Triple Data 
Encryption Algorithm (TMOVS): Requirements and Procedures, April 2000
• National Institute of Standards and Technology Special Publication 
800-21-1, Second Edition, Guideline for Implementing Cryptography in the 
Federal Government, December 2005
• National Institute of Standards and Technology Special Publication 
800-22, A Statistical Test Suite for Random and Pseudorandom Number 
Generators for Cryptographic Applications, May 2001
• National Institute of Standards and Technology Special Publication 
800-23, Guideline to Federal Organizations on Security Assurance and 
Acquisition/Use Tested/Evaluated Products, August 2000
• National Institute of Standards and Technology Special Publication 
800-24, PBX Vulnerability Analysis: Finding Holes in Your PBX Before 
Someone Else Does, August 2000
• National Institute of Standards and Technology Special Publication 
800-25, Federal Agency Use of Public Key Technology for Digital 
Signatures and Authentication, October 2000
• National Institute of Standards and Technology Special Publication 
800-27, Revision A, Engineering Principles for Information Technology 
Security (A Baseline for Achieving Security), June 2004
• National Institute of Standards and Technology Special Publication 
800-28, Guidelines on Active Content and Mobile Code, October 2001
• National Institute of Standards and Technology Special Publication 
800-29, A Comparison of the Security Requirements for Cryptographic 
Modules in FIPS 140-1 and FIPS 140-2, June 2001
• National Institute of Standards and Technology Special Publication 
800-30, Risk Management Guide for Information Technology Systems, July 2002
• National Institute of Standards and Technology Special Publication 
800-31, Intrusion Detection Systems (IDS), November 2001
• National Institute of Standards and Technology Special Publication 
800-32, Introduction to Public Key Technology and the Federal PKI 
Infrastructure, February 2001
• National Institute of Standards and Technology Special Publication 
800-33, Underlying Technical Models for Information Technology Security, 
December 2001
• National Institute of Standards and Technology Special Publication 
800-34, Contingency Planning Guide for Information Technology Systems, 
June 2002
• National Institute of Standards and Technology Special Publication 
800-35, Guide to Information Technology Security Services, October 2003
• National Institute of Standards and Technology Special Publication 
800-36, Guide to Selecting information Security Products, October 2003
• National Institute of Standards and Technology Special Publication 
800-37, Guide for the Security Certification and Accreditation of 
Federal Information Systems, May 2004
• National Institute of Standards and Technology Special Publication 
800-38A, Recommendation for Block Cipher Modes of Operation – Methods 
and Techniques, December 2001
• National Institute of Standards and Technology Special Publication 
800-38B, Recommendation for Block Cipher Modes of Operation: The CMAC 
Mode for Authentication, May 2005
• National Institute of Standards and Technology Special Publication 
800-38C, Recommendation for Block Cipher Modes of Operation: The CCM 
Mode for Authentication and Confidentiality, May 2004
• National Institute of Standards and Technology Special Publication 
800-38D, Recommendation for Block Cipher Modes of Operation: 
Galois/Counter Mode (GCM) for Confidentiality and Authentication 
(Draft), April 2006
• National Institute of Standards and Technology Special Publication 
800-40, Version 2, Creating a Patch and Vulnerability Management 
Program, November 2005
• National Institute of Standards and Technology Special Publication 
800-41, Guidelines on Firewalls and Firewall Policy, January 2002
• National Institute of Standards and Technology Special Publication 
800-42, Guide on Network Security Testing, October 2003
• National Institute of Standards and Technology Special Publication 
800-43, Systems Administration Guidance for Windows 2000 Professional, 
November 2002
• National Institute of Standards and Technology Special Publication 
800-44, Guidelines on Security Public Web Servers, September 2002
• National Institute of Standards and Technology Special Publication 
800-45A (Draft), Guidelines on Electronic Mail Security, August 2006
• National Institute of Standards and Technology Special Publication 
800-46, Security for Telecommuting and Broadband Communications, August 2002
• National Institute of Standards and Technology Special Publication 
800-47, Security Guide for Interconnecting Information Technology 
Systems, August 2002
• National Institute of Standards and Technology Special Publication 
800-48, Wireless Network Security: 802.11, Bluetooth, and Handheld 
Devices, November 2002
• National Institute of Standards and Technology Special Publication 
800-49, Federal S/MIME V3 Client Profile, November 2002
• National Institute of Standards and Technology Special Publication 
800-50, Building an Information Technology Security Awareness and 
Training Program, October 2003
• National Institute of Standards and Technology Special Publication 
800-51, Use of the Common Vulnerabilities and Exposures (CVE) 
Vulnerability Naming Scheme, September 2002
• National Institute of Standards and Technology Special Publication 
800-52, Guidelines for the Selection and Use of Transport Layer Security 
(TLS) Implementation, June 2005
• National Institute of Standards and Technology Special Publication 
800-53 Revision 1, Recommended Security Controls for Federal Information 
Systems, December 2006
• National Institute of Standards and Technology Special Publication 
800-53A, Guide for Assessing the Security Controls in Federal 
Information Systems (Second Public Draft), April 2006
• National Institute of Standards and Technology Special Publication 
800-54, Border Gateway Protocol Security (Draft), September 2006
• National Institute of Standards and Technology Special Publication 
800-55, Security Metrics Guide for Information Technology Systems, July 2003
• National Institute of Standards and Technology Special Publication 
800-56A, Recommendations for Pair-Wise Key Establishment Schemes Using 
Discrete Logarithm Cryptography, March 2006
• National Institute of Standards and Technology Special Publication 
800-57, Recommendation on Key Management, August 2005
• National Institute of Standards and Technology Special Publication 
800-58, Security Considerations for Voice Over IP Systems, January 2005
• National Institute of Standards and Technology Special Publication 
800-59, Guideline for Identifying an Information System as a National 
Security System, August 2003
• National Institute of Standards and Technology Special Publication 
800-60, Guide for Mapping Types of Information and Information Systems 
to Security Categories, June 2004
• National Institute of Standards and Technology Special Publication 
800-61, Computer Security Incident Handling Guide, January 2004
• National Institute of Standards and Technology Special Publication 
800-63, Version 1.0.2, Electronic Authentication Guideline: 
Recommendations of the National Institute of Standards and Guidelines, 
April 2006
• National Institute of Standards and Technology Special Publication 
800-64, Revision 1, Security Considerations in the Information System 
Development Life Cycle, June 2004
• National Institute of Standards and Technology Special Publication 
800-65, Integrating Security into the Capital Planning and Investment 
Control Process, January 2005
• National Institute of Standards and Technology Special Publication 
800-66, An Introductory Resource Guide for Implementing the Health 
Insurance Portability and Accountability Act (HIPAA) Security Rule, 
March 2005
• National Institute of Standards and Technology Special Publication 
800-67, Recommendation for the Triple Data Encryption Algorithm (TDEA) 
Block Cipher, May 2004
• National Institute of Standards and Technology Special Publication 
800-68, Guidance for Security Microsoft Windows XP Systems for IT 
Professionals: A NIST Security Configuration Checklist, October 2005
• National Institute of Standards and Technology Special Publication 
800-69, Guidance for Security Microsoft Windows XP Home Edition: A NIST 
Security Configuration Checklist, September 2006
• National Institute of Standards and Technology Special Publication 
800-70, Security Configuration Checklists Program for IT Products: 
Guidance for Checklists Users and Developers, May 2005
• National Institute of Standards and Technology Special Publication 
800-72, Guidelines on PDA Forensics, November 2004
• National Institute of Standards and Technology Special Publication 
800-73, Revision 1, Interfaces for Personal Identity Verification, April 
2006
• National Institute of Standards and Technology Special Publication 
800-76-1, Biometric Data Specification for Personal Identity 
Verification (Draft), September 2006
• National Institute of Standards and Technology Special Publication 
800-77, Guide to IPsec VPNs, December 2005
• National Institute of Standards and Technology Special Publication 
800-78, Cryptographic Algorithms and Key Sizes for Personal Identity 
Verification, April 2005
• National Institute of Standards and Technology Special Publication 
800-79, Guidelines for the Certification and Accreditation of PIV Card 
Issuing Organizations, July 2005
• National Institute of Standards and Technology Special Publication 
800-81, Secure Domain Name System (DNS) Deployment Guide, May 2006
• National Institute of Standards and Technology Special Publication 
800-82, Guide to Supervisory Control and Data Acquisition (SCADA) and 
Industrial Control Systems Security (Draft), September 2006
• National Institute of Standards and Technology Special Publication 
800-83, Guide to Malware Incident Prevention and Handling, November 2005
• National Institute of Standards and Technology Special Publication 
800-84, Guide to Test, Training, and Exercise Programs for IT Plans and 
Capabilities, September 2006
• National Institute of Standards and Technology Special Publication 
800-85A, PIV Card Application and Middleware Interface Test Guidelines, 
April 2006
• National Institute of Standards and Technology Special Publication 
800-85B, PIV Data Model Test Guidelines, July 2006
• National Institute of Standards and Technology Special Publication 
800-86, Guide to Integrating Forensic Techniques into Incident Response, 
August 2006
• National Institute of Standards and Technology Special Publication 
800-87, Codes for the Identification of Federal and Federally-Assisted 
Organizations, January 2006
• National Institute of Standards and Technology Special Publication 
800-88, Guidelines for Media Sanitization, September 2006
• National Institute of Standards and Technology Special Publication 
800-89, Recommendation for Obtaining Assurances for Digital Signature 
Applications, November 2006
• National Institute of Standards and Technology Special Publication 
800-90, Recommendation for Random Number Generation Using Deterministic 
Random Bit Generators, June 2006
• National Institute of Standards and Technology Special Publication 
800-92, Guide to Computer Security Log Management, September 2006
• National Institute of Standards and Technology Special Publication 
800-94, Guide to Intrusion Detection and Prevention (IDP) Systems 
(Draft), August 2006
• National Institute of Standards and Technology Special Publication 
800-95, Guide to Secure Web Services (Draft), August 2006
• National Institute of Standards and Technology Special Publication 
800-96, PIV Card/Reader Interoperability Guidelines, September 2006
• National Institute of Standards and Technology Special Publication 
800-97, Guide to IEEE 802.11: Establishing Robust Security Networks 
(Draft), June 2006
• National Institute of Standards and Technology Special Publication 
800-98, Guidance for Security Radio Frequency Identification (RFID) 
Systems (Draft), September 2006
• National Institute of Standards and Technology Special Publication 
800-100, Information Security Handbook: A Guide for Managers , October 2006
• National Institute of Standards and Technology Special Publication 
800-101, Guidelines on Cell Phone Forensics (Draft), August 2006
• Government Accountability Office, Federal Information System Controls 
Audit Manual, GAO/AIMD-12.19.6, January 1999
• DISA Security Technical Implementation Guides (STIGs) and Checklists 
at http://csrc.nist.gov/pcig/cig.html
• GSA Order CIO 2140.2, System Development Life Cycle (SDLC) Policy 
Handbook, April 20, 2004
• GSA Order CIO 2160.2, GSA Electronic Messaging Policy
• GSA Order CIO 2100.2, GSA Wireless Local Area Network (LAN) Security, 
October 30, 2005
• GSA Order CIO P 2100.1D, GSA Information Technology (IT) Security 
Policy, June 21, 2007
• GSA Order CPO 1878.2, Conducting Privacy Impact Assessment, May 28, 2004
• GSA Order CPO 1878.1, GSA Privacy Act Program, October 27, 2003
• GSA Order CIO 2104.1, GSA Information Technology (IT) General Rules of 
Behavior, July 3, 2003
• GSA Handbook ADM P 9732.1C, Suitability and Personnel Security, 
February 17, 2006
• CIO Instructional Letter 05-03 Mandatory IT Security Training for 
Agency and Contractor Employees with Significant Security 
Responsibilities, April 21, 2005
• IT Security Procedural Guide: Bluetooth Security Hardening, CIO-IT 
Security-07-36, March 7, 2007
• IT Security Procedural Guide: Web Application Security Guide, CIO-IT 
Security-07-35, Revision 1, February 12, 2007
• IT Security Procedural Guide: CISCO CALL Manager and Unity Hardening, 
CIO-IT Security-07-34, February 12, 2007
• IT Security Procedural Guide: McAfee VirusScan 8.0i, CIO-IT 
Security-06-33, Revision 1, February 21, 2007
• IT Security Procedural Guide: Media Sanitization Guide, CIO-IT 
Security-06-32, December 21, 2006
• IT Security Procedural Guide: Firewall Change Request, CIO-IT 
Security-06-31, November 8, 2006
• IT Security Procedural Guide: Handling IT Security Incidents, CIO-IT 
Security-01-02, Revision 3, July 23, 2006
• Standard Operating Procedure For GSA HSPD-12 Personnel Security 
Process, October 26, 2005
• IT Security Procedural Guide: Home Users Guide, CIO-IT Security-04-24, 
Revision 1, September 29, 2005
• IT Security Procedural Guide: Developing a Configuration Management 
(CM) Plan, CIO-IT Security-01-05, Revision 1, September 9, 2005
• IT Security Procedural Guide: Termination and Transfer, CIO-IT 
Security-03-23, Revision 1, August 29, 2005
• IT Security Procedural Guide: Auditing and Monitoring, CIO-IT 
Security-01-08, Revision 1, June 29, 2005
• IT Security Procedural Guide: Password Generation and Protection, 
CIO-IT Security-01-01, Revision 1, June 23, 2005
• IT Security Procedural Guide: Access Control, CIO-IT Security-01-07, 
Revision 1, June 23, 2005
• IT Security Procedural Guide: FISMA/POA&M Implementation, CIO-IT 
Security-04-26, Revision 4, May 26, 2005
• IT Security Procedural Guide: IT Security Training and Awareness 
Program, CIO-IT Security-05-29, Revision 1 April 27, 2006
• IT Security Procedural Guide: Contingency Plan Testing, CIO-IT 
Security-06-29, Revision 1, February 22, 2007
• IT Security Procedural Guide: Managing Enterprise Risk, CIO-IT 
Security-06-30, Revision 3, March 20, 2007
• IT Security Procedural Guide: Windows XP Professional Hardening, 
CIO-IT Security-03-22, Revision 6a, March 3, 2006
• IT Security Procedural Guide: Oracle Database Hardening, CIO-IT 
Security-05-28, March 29, 2005
• IT Security Procedural Guide: CISCO Router Hardening, CIO-IT 
Security-05-27, March 8, 2005
• IT Security Procedural Guide: Windows 2000 Professional Hardening, 
CIO-IT Security-02-15, Revision 3, November 16, 2004
• IT Security Procedural Guide: Windows 2003 Server Hardening, CIO-IT 
Security-04-25, Revision 2, June 21, 2006
• IT Security Procedural Guide: Sun Solaris Hardening, CIO-IT 
Security-02-20, August 30, 2002
• IT Security Procedural Guide: IIS 5.0 Server Hardening Implementation 
Guide, CIO-IT Security-02-19, July 24, 2002
• IT Security Procedural Guide: IIS 5.0 Server Hardening, CIO-IT 
Security-02-18, July 24, 2002
• IT Security Procedural Guide: Windows 2000 Server Hardening 
Implementation Guide, CIO-IT Security-02-17, July 24, 2002
• IT Security Procedural Guide: Windows 2000 Server Hardening, CIO-IT 
Security-02-16, July 24, 2002
• IT Security Procedural Guide: Microsoft IIS 4.0 Hardening, CIO-IT 
Security-01-14, May 14, 2001
• IT Security Procedural Guide: Windows NT 4.0 Hardening, CIO-IT 
Security-01-13, May 14, 2001
• GSA Internet Explorer 6.0 Configuration Guide
• FTS CIO Policy Memo 03-08 Account Closeout Procedures
• FTS CIO Policy Memo 03-04 Local Workstation Access Rights
• Computer Fraud & Abuse of 1986, as amended, Public Law 99-474
• OMB Memorandum M-01-08

Colin Wallis wrote:
> This query is directed to our US members.
>
> One of the things that we struggled with was a 'balance' and that is reflected in the references.  You'll see that many of the refs are UK (or dare I say 'Commonwealth') based..
>
> Can the US folk direct us to specific references regarding eGovernment in the US? I have tried to in the past and found the cupboard curiously bare...hence the reliance on our personal knowledge.
>
> Now maybe that's because I'm not searching correctly but ..any help would be appreciated. If we found a really pithy and relevant reference we could analyse, we could modify the text accordingly and include the ref.
>
> Thanks
> Cheers
> Colin  
>
> -----Original Message-----
> From: Colin Wallis 
> Sent: Wednesday, 17 March 2010 10:37 a.m.
> To: 'tony@yaanatech.com'
> Cc: egov-ms@lists.oasis-open.org
> Subject: RE: [egov-ms] OASIS eGOV MS : NEW GUIDANCE DOCUMENTS
>
> Brilliant insight Tony. Thanks very much. Much deeper than can be gleaned from external sources:-)
>  
> Cheers
> Colin
> -----Original Message-----
> From: Tony Rutkowski [mailto:tony@yaanatech.com] 
> Sent: Wednesday, 17 March 2010 10:29 a.m.
> To: Colin Wallis
> Cc: Daniel.E.Turissini.(Affiliate).ORC1000000106.ID; John Borras; egov-ms@lists.oasis-open.org
> Subject: Re: [egov-ms] OASIS eGOV MS : NEW GUIDANCE DOCUMENTS
>
> On 3/16/2010 4:33 PM, Colin Wallis wrote:
>   
>> Look at Lesson 1 and Lesson 3 again for example. Do you not see the US experience reflected here?
>>    
>>     
>
> The US problem is significantly exacerbated by legal
> jurisdiction issues and related historical decisions.
> I was at the FCC for about 12 years during some of
> the history.
>
> The US has this strong division between public
> infrastructure and services (meaning available to
> the public) and governmental (largely Federal).
> A number of Federal agencies attend to the care
> and feeding of their domain, especially the multiple
> pieces of DOD and GSA.  An entirely separate
> "independent agency" - the FCC - is responsible
> for everything non-Federal.  It even reports to
> the legislative branch of the government, and not
> the executive.
>
> To make matters worse, the FCC beginning with
> the original Computer I proceeding in 1966 made
> the (in retrospect) profound mistake of not asserting
> its jurisdiction over anything other than radio and
> common carrier services.  Cable has peeked in and
> out of that mix.  In a rational world, one would have
> expected a FCC like entity to have dealt with security,
> infrastructure protection, etc, for all information
> infrastructure/services provided to the public.  Instead,
> they played dead and hired ever larger number of lawyers
> and getting rid of engineers as they debated "angels on
> a head of a pin" kinds of issues concerning jurisdiction.
>
> That proclivity tilted back slightly over the past couple
> of years in the utterly bizarre area of "network neutrality"
> in a foolhardy attempt to control how transport providers
> manage their networks for "neutrality."  Even today,
> the only vision they evince is pushing out bandwidth
> to rural areas.  For the FCC, it's all a "black box" for
> to diddle with to meet the latest lobbying craze from
> what's known as K-street.
>
> On a slightly separate note, my current admonition as
> to e-government security is simply to enter "https://";
> and some government website.  You can quickly
> separate the clueless from the rest.  If you get an
> EVcert, they get extra points!
>
> cheers,
> tony
>
> ====
> CAUTION:  This email message and any attachments contain information that may be confidential and may be LEGALLY PRIVILEGED. If you are not the intended recipient, any use, disclosure or copying of this message or attachments is strictly prohibited. If you have received this email message in error please notify us immediately and erase all copies of the message and attachments. Thank you.
> ====
>
> ---------------------------------------------------------------------
> To unsubscribe from this mail list, you must leave the OASIS TC that
> generates this mail.  Follow this link to all your TCs in OASIS at:
> https://www.oasis-open.org/apps/org/workgroup/portal/my_workgroups.php 
>
>   

-- 

Daniel E. Turissini,

CEO, Operational Research Consultants, Inc.

11250 Waples Mill Road, South Tower, Suite 210, Fairfax, Virginia 22030

703-246-8550

:: View the ORC/ FiXs Presentation [http://tinyurl.com/p6rs52] from 
AFCEA LandWarNet 2009 ::

The information transmitted in this e-mail is for the exclusive use of 
the person or entity to which it is addressed and may contain legally 
privileged or confidential information. If you are not the intended 
recipient of this e-mail, you are prohibited from reading, printing, 
duplicating, disseminating or otherwise using or acting in reliance upon 
this information. If you have received this information in error, please 
notify the sender at Operational Research Consultants, Inc. immediately, 
delete this information from your computer and destroy all copies of the 
information.



[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]